CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/18/2017

Emerging Cyber Threats

Emerging Cyber Threats


Nick Sturgeon - IN-ISAC
(347.8MB): Video Icon MP4 Video   Watch on Youtube
01/25/2017

Changing the Economics of the Network

Changing the Economics of the Network


Jean Camp - Indiana University
(171.4MB): Video Icon MP4 Video   Watch on Youtube
02/01/2017

Network Deception as a Threat Intelligence Platform

Network Deception as a Threat Intelligence Platform


Vincent Urias - Sandia
(242.1MB): Video Icon MP4 Video   Watch on Youtube
02/08/2017

Cyber Security in Large Complex Corporations

Cyber Security in Large Complex Corporations


Neil Cassidy
(289.9MB): Video Icon MP4 Video   Watch on Youtube
02/15/2017

Behavioral and Computational Aspects of Network Security Games

Behavioral and Computational Aspects of Network Security Games


Ashish Hota - Purdue University
(81.3MB): Video Icon MP4 Video   Watch on Youtube
02/22/2017

A2C: Self Destructing Exploit Executions via Input Perturbation

A2C: Self Destructing Exploit Executions via Input Perturbation


Yonghwi Kwon - Purdue University
(121.4MB): Video Icon MP4 Video   Watch on Youtube
03/01/2017

Cancelled



03/08/2017

The Rise of Cyber-Crime: A Legal Perspective

The Rise of Cyber-Crime: A Legal Perspective


Stephen Reynolds - Ice Miller
(140.0MB): Video Icon MP4 Video   Watch on Youtube
03/22/2017

CIO Risk Appetite and Information Security Management

CIO Risk Appetite and Information Security Management


Tawei (David) Wang - DePaul University
(320.0MB): Video Icon MP4 Video   Watch on Youtube
03/29/2017

DataShield: Configurable Data Confidentiality and Integrity

DataShield: Configurable Data Confidentiality and Integrity


Scott Carr - Purdue University
(140.3MB): Video Icon MP4 Video   Watch on Youtube
04/12/2017

Information Flow Security in Practical Systems

Information Flow Security in Practical Systems


Limin Jia - Carnegie Mellon University
(372.6MB): Video Icon MP4 Video   Watch on Youtube
04/19/2017

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices


Ron Ross - National Institute for Standards and Technology (NIST)
(624.3MB): Video Icon MP4 Video   Watch on Youtube
04/26/2017

Enabling Trust and Efficiency in Provenance-Aware Systems

Enabling Trust and Efficiency in Provenance-Aware Systems


Adam Bates - University of Illinois at Urbana-Champaign
(575.2MB): Video Icon MP4 Video   Watch on Youtube
08/30/2017

The Stark Reality of Red vs. Blue and Why it's Not Working

The Stark Reality of Red vs. Blue and Why it's Not Working


Chris Roberts - Acalvio Technologies
(149.2MB): Video Icon MP4 Video   Watch on Youtube
09/06/2017

Secure Code Development

Secure Code Development


Doug Smith - Northrop Grumman
(153.9MB): Video Icon MP4 Video   Watch on Youtube
09/13/2017

Advanced Testing Assessments in the Power & Utilities Industry

Advanced Testing Assessments in the Power & Utilities Industry


Bob Cheripka - Deloitte
(135.4MB): Video Icon MP4 Video   Watch on Youtube
09/20/2017

 Counter UAS Challenges and Technology

Counter UAS Challenges and Technology


Vince D'Angelo - SRC
(123.4MB): Video Icon MP4 Video   Watch on Youtube
09/27/2017

Vulnerability Scanning, how it works and why

Vulnerability Scanning, how it works and why


Tony Huffman - Tenable Network Security
(94.8MB): Video Icon MP4 Video   Watch on Youtube
10/11/2017

Memory Hard Functions and Password Hashing

Memory Hard Functions and Password Hashing


Jeremiah Blocki
(147.6MB): Video Icon MP4 Video   Watch on Youtube
10/18/2017

 Locally Differential Private Protocols for Frequency Estimation

Locally Differential Private Protocols for Frequency Estimation


Tianhao Wang - Purdue University
(106.3MB): Video Icon MP4 Video   Watch on Youtube
11/01/2017

Opportunities and Perils of the Cyber Revolution

Opportunities and Perils of the Cyber Revolution


Mikhail J. Atallah
(564.6MB): Video Icon MP4 Video   Watch on Youtube
11/08/2017

Refraction Networking: Censorship Circumvention in the Core of the Internet

Refraction Networking: Censorship Circumvention in the Core of the Internet


Nikita Borisov - University of Illinois at Urbana-Champaign
(342.3MB): Video Icon MP4 Video   Watch on Youtube
12/06/2017

Penetration Testing: What? Why? How?


Nat Shere - Rook

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.